Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

What improvements have been made to the IGMPv2 protocol compared to IGMPv1? ( Multiple Choice)

Options:

A.

Added maximum response time field

B.

Added high group messages

C.

Added specific group query message

D.

Added a specific source group query packet

Buy Now
Questions 5

Which of the following LSAs propagate in a single region only?

Options:

A.

Router LSA

B.

Summary LSA

C.

Network LSA

D.

AS External LSA

Buy Now
Questions 6

Which of the following DNS resource records are legitimate?

Options:

A.

FQDN

B.

NS

C.

PTR

D.

MX

E.

A

Buy Now
Questions 7

WRED is configured on the newly deployed router HW The following description of the WRED feature is correct as ?( Multiple select).

Options:

A.

WRED can set different drop thresholds and packet loss rates for packets of different priority

B.

When traffic exceeds the minimum threshold, WRED starts dropping all ingress traffic (tail drops).

C.

Avoid global synchronization by selectively dropping multiple TCP streams Low-bandwidth traffic is easier to drop than high-bandwidth traffic

Buy Now
Questions 8

As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec tunnel needs to be established between the two IPv6 networks to communicate, which of the following requirements?(). Single choice questions).

H12-891_V1.0 Question 8

Options:

A.

ESP + tunnel mode

B.

AH + transmission mode

C.

AH + tunnel mode

D.

None of the above options are correct

Buy Now
Questions 9

Regarding BGP route filtering, the following description is wrong?

Options:

A.

The filtering relationship between Route-Policy's noodes is "or." ", that is, as long as a node filter is passed, it can pass through the Route-policyo

B.

For routes published locally, configure a routing policy that takes effect before the route is added to the BGP route table.

C.

In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationships.

D.

When a route to a BGP peer is received, a routing policy is enforced to filter unwanted BGP routes that are not added to the local BGP routing table.

Buy Now
Questions 10

Which of the following is the benefit of VLAN aggregation?

Options:

A.

Implements isolation of broadcast domains between Sub-VLANs

B.

Reduce the waste of IP addresses

C.

Increased number of available VLANs

D.

Increased flexibility in addressing

Buy Now
Questions 11

0SPFV2 is running on the IPV4 network IGP: OSPF3 is running in the IPV6 network, OSPF35 OSPFV2 has the same message type. Includes hello messages, DOD messages, LSR messages, LAU messages, and SAX messages about OSPP The following statement is correct?

Options:

A.

The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface

B.

OSPFv3 uses the authentication field of the packet header to complete the packet authentication

C.

OSPFv3 uses the link-local address as the source address for sending packets, which can be forwarded outside the range of the originating link

D.

OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02

Buy Now
Questions 12

What command can be used to prevent users from accessing multiple devices through the HUB on the switch's access port?( Radio).

Options:

A.

[Huawe interface Gigabithemeto/0/1[Huawei-GigabiEthermeto/O/lport linktypetrunk [Huawel-GigabithemetO/1]port trunk allow pass vlan 10

B.

[Huawei interface GigabiEthemet/0/1[Huawe-GigablEthemetO/0/1Jpor ink type acess(Huawei GigabitEthemet/O/Tipsg enable

C.

Huawei interface GigabiEthemetO/0/1Huawei-GigabiEthemetO/OJport link-type acces Huawei GigabilEthemet/0/1port-secunty enable0

D.

[Huawei iterface Gigabithemeto/0/1 (Huawei-GigabitEthemeto//1)pot ink type access(Huawel-CigabiEthemeto/1]portisolate enable

Buy Now
Questions 13

To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the following messages is required?

Options:

A.

Type5

B.

Type4

C.

Typel

D.

Type2

E.

Type3

Buy Now
Questions 14

Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?

Options:

A.

Enable traffic to be forwarded locally first

B.

Connect the stacking device via a stacking card

C.

Configure the stacking system MAC address switching

D.

Enables the stacking multi-master check function

Buy Now
Questions 15

The correct description of the scene shown in the following figure is:

H12-891_V1.0 Question 15

Options:

A.

LSDB

B.

R1, which exists in both Level-1 and Leve-2, can ping the interface address of R2 loopback0

C.

R there is a route to R2 loopback0 10022/32

D.

No neighbor relationship can be established between R1 and R2

Buy Now
Questions 16

BGP can only automatically aggregate routes whose source is Incomplete.

Options:

A.

True

B.

False

Buy Now
Questions 17

The following statement about isis protocol LSP messages is correct

Options:

A.

The isP rapid diffusion feature, which first diffuses out LSPs that are smaller than a specified number , speeding up the synchronization process of LSDB

B.

By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency at which the routing information changes

C.

As link status information increases, the packet length of the LSP can be increased so that each ISP can carry more information.

D.

Reducing the minimum interval at which LSPs are sent per port can speed up the diffusion of LSPs.

Buy Now
Questions 18

An advanced access control list is a sequence of rules consisting of permit |deny statements that can match IP messages based on which attributes ?(). Multiple select).

Options:

A.

Destination port number

B.

Source address

C.

Destination address

D.

Source port number

Buy Now
Questions 19

Which of the following sequences can be matched by the regular expression [^100|200]$?

Options:

A.

300200 100

B.

200 100 300

C.

100 200 300

D.

100,300,200

Buy Now
Questions 20

In EPIM-SM, the following description of the PIM Join message is correct?

APIM Join messages are sent every 3 minutes, and status B. PIM Join messages for the multicast tree are only sent when the multicast tree is first established

C. The PIM Join message is sent every 60 seconds to refresh the status of the upstream router mroute for the multicast tree

D. The upstream router sends a PIM Join acknowledgment in response to each PIM Join message received from the downstream router

Options:

Buy Now
Questions 21

The network administrator defines a traffic policing policy as follows:

H12-891_V1.0 Question 21

Options:

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Buy Now
Questions 22

The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration

H12-891_V1.0 Question 22

Options:

A.

[Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit

B.

[Qudway ineface gigabtethemnet /0'1

[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit

C.

Quidway inteface gigabiethenet ou0/1

[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut

D.

[Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20

E.

[Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit

Buy Now
Questions 23

When configuring ISIS zone authentication, which ISIS message will carry the authentication letter? ( Single choice questions).

Options:

A.

ISIS ?Level-1 ?SNP ?LSP?

B.

ISIS ?Level-2 ?SNP ?LSP?

C.

Hello message of ISIS's Level-1.

D.

Hello message of ISIS's Level-2

Buy Now
Questions 24

The following description of the link state protocol is plausible?

Options:

A.

CPU utilization is high and loops are easy to generate

B.

Slow convergence and low CPU utilization

C.

Fast convergence and low CPU utilization

D.

Fast convergence and high CPU utilization

Buy Now
Questions 25

The following statements about the VRRP protocol are correct (multiple choice).

Options:

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support authentication, while VRRPV2 does

C.

VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks

D.

The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254

Buy Now
Questions 26

The following statement about the concept of multicast is wrong?

Options:

A.

Multicast Source: The sender of the message needs to join the multicast group to provide forwarding of multicast group messages

B.

Multicast router: A router or layer-three switch that supports layer-3 multicast functionality

C.

Multicast Group Members: Multicast group members can be widely distributed anywhere in the network

D.

Multicast Groups: A collection identified by ip multicast addresses

Buy Now
Questions 27

The command ip as-path-fiter as-path-fiter-number (denylpermit) regular-expression to configure as-path-ilter, in this command , multiple sentences can form an as-path-filter statement, what is the relationship between so many statements?

Options:

A.

Routes match in order When a route matches to a clause, the relationship between

B.

and is no longer matched downwards

C.

or relationships

D.

Routes match in order and routes need to match all sub-directions

Buy Now
Questions 28

Which of the following statements about RADIUS is correct?( Single choice questions).

Options:

A.

MAC authentication does not require a username password, so you cannot use RADIUS to authenticate the user.

B.

RADIUS supports both wired and wireless access modes.

C.

SEPARATION OF RADIUS PROTOCOL AUTHENTICATION, AUTHORIZATION, AND AUDIT.

D.

RADIUS authentication and Portal authentication cannot be used together because the Portal server can typically be used to authenticate users when portal authentication is deployed.

Buy Now
Questions 29

In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)

Options:

A.

When the port state transitions from Forwarding to Disking

B.

Only when the port state transitions from Listening to Disccarding

C.

When a topology change notification is received

D.

When the status of a port changes

E.

CE when the port state transitions from Disking to Forwarding

Buy Now
Questions 30

The following statement about ISIS (IPv6) is correct?

Options:

A.

In order to support the processing and calculation of IPV6 routes, IS-IS has added TLV232, 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

To support the processing and computation of IPv6 routes, IS-IS has added NLPID to the 129TLV

Buy Now
Questions 31

You are now troubleshooting a LAN, and you suspect that the error is due to a mismatch in the work mode. Which switch interface error indicates that the 10/100/100O IEE gigabit interface operating mode does not match?( Multiple choice questions).

Options:

A.

Alignment error

B.

FCS error

C.

Super Small Frame

D.

Excess Conflict

E.

Lag conflicts

Buy Now
Questions 32

In route-policy, what are the BGP attributes that can be used for the apply clause?

Options:

A.

AS-Path

B.

MED

C.

Local-Preference

D.

Day

Buy Now
Questions 33

Router HW cannot access hosts in the remote network, router HW runs routing protocols and only pings the remote file server address 105401 on router HW with extensions through a default route remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according to the above description, the error in the following analysis is ?

Options:

A.

The next hop router for router HW did not reach the destination address

B.

Router HW does not have a legitimate router to reach the destination address

C.

Ping is successful, but congestion occurs on the path to the destination address

D.

There is a firewall in the remote destination network, and the destination address can be reached without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply

Buy Now
Questions 34

ICMPv6 has two types: Error Messages and Information Messages.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select).

Options:

A.

Host Information Collection

B.

Local ARP agent

C.

port isolation

D.

ARP broadcast suppression

Buy Now
Questions 36

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

H12-891_V1.0 Question 36

Options:

A.

The 2::/64 route appears in the P route table

B.

The 2019:/64 route appears in the IP routing table

C.

2020::/64 The route appears in the IP routing table

D.

The 2021/64 route will appear in the IP routing table

Buy Now
Questions 37

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

Options:

A.

The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.

B.

IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.

C.

IPv6 Over VLANs do not generate ND table entries.

D.

IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.

Buy Now
Questions 38

For Layer 2 VPN technology, the following statement is correct?( Multiple choice questions).

Options:

A.

VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access.

B.

The VPLS configuration is complex and the Layer 2 network transmits BUM packets.

C.

BGP EVPN supports features such as tenant isolation, Multi-homing , and broadcast suppression.

D.

BGP EVPN addresses issues such as MAC address drift and multi-tenancy that VPLS cannot support.

Buy Now
Questions 39

By default, which of the following security MAC address types lose table entries after the device restarts?

Options:

A.

Sticty MAC address

B.

Black hole MAC address

C.

Secure static MAC address

D.

Secure dynamic MAC address

Buy Now
Questions 40

What mechanisms or techniques can VRRP combine with to monitor uplink connectivity?

Options:

A.

IP-link

B.

BFD

C.

NQA

D.

Interface trace

Buy Now
Questions 41

A multi-protocol network, the topology is shown in the figure. Take a closer look at the topology, router R4 (in Areal) is introduced into the OSPF process via the routes learned by BGP. So what categories of LS4 will R3 advertise to zone 0?( Multiple choice questions).

H12-891_V1.0 Question 41

Options:

A.

5 ?LSA

B.

7 ?LSA

C.

1 ?LSA

D.

4 ?LSA

E.

2 ?? ??

Buy Now
Questions 42

What information does this contain in a basic layer packet? (Multiple choice) A Data link layer header

B. Upper-level data

C. The network layer header

D. path records

E. Network Layer Tail

Options:

Buy Now
Questions 43

The following link-LSA for OSPFv3 is correct?

Options:

A.

Contains both the link-local address of this interface and all IPV6 prefixes of the same area on this router.

B.

Contains both the link-local address of the interface and all IPv6 prefixes on the interface.

C.

?Link-LSA ???Prefix ?Prefixoptions ???Ox00,?? Prefix ????IPv6??????

D.

The Option field exists in the header of the LSA, not in the data area of the Link-LSA

Buy Now
Questions 44

As shown in the figure, a company wants to achieve secure mutual access between the head office and branches through MPLSVPN, and at the same time requires that the IPN traffic of the branch bank must be forwarded through the head office to achieve traffic monitoring

H12-891_V1.0 Question 44

Options:

A.

VPN routing information can be exchanged between A. CE and PE using BGP messages

B.

When Hub-CE passes routing information with Hub-PE, you need to configure a route on Hub-PE that allows receiving AS numbers to be repeated 1 time to receive routes published by Hub-CE

C.

Between Hub-CE and Hub-PE, and between Spoke-PE and Plan-CE, routing information can be exchanged using the OSPF protocol

D.

An MP-IBGP peer relationship is established between Spoke-PE and THE VPN routing information is exchanged.

Buy Now
Questions 45

Which timer for spanning tree protocol dictates how often to see the root bridge send configuration BPDUs?

Options:

A.

forwarding delay timer

B.

STP timer

C.

HOLD timer

D.

Maxage timer

E.

Hello timer

Buy Now
Questions 46

When an administrator configures VRRP, which of the following is not required?

Options:

A.

Preemption mode

B.

Priority of the virtual router

C.

Preemption delay

D.

Virtual IP address

Buy Now
Questions 47

In a network in MPLSVPN, different CE devices can exchange routing information with the same PE device using different routing protocols, and different CE devices can exchange routing information with the same PE The routing protocols used between devices are independent of each other

Options:

A.

True

B.

False

Buy Now
Questions 48

The following message about the Register in PIM-SM describes the correct ?( Multiple choice questions).

Options:

A.

The Register message enables the RP to learn the multicast source information

B.

The Register message is sent by the receiver router

C.

Register messages are sent to RPv via unicast instead of multicast

D.

The Register message is sent by the source DR

Buy Now
Questions 49

The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.

Options:

A.

True

B.

False

Buy Now
Questions 50

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

Options:

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Buy Now
Questions 51

Based on the configuration shown in the figure below, it can be known that R4 has () interfaces advertised into IS-IS?

H12-891_V1.0 Question 51

Options:

A.

2

B.

3

C.

1

D.

0

Buy Now
Questions 52

Regarding the Stub region in the OSPF protocol, the following statement is correct.

Options:

A.

Virtual connections cannot traverse the Stub region

B.

Backbone zones cannot be configured as Stub zones

C.

ASBR cannot exist in the Stub zone

D.

Type7 LSA injection is not allowed in the Stub zone

Buy Now
Questions 53

Which of the following options enables encapsulation and unencapsulation of VXLAN messages?

Options:

A.

VBDIF

B.

VLANIF

C.

BD

D.

VTEP

Buy Now
Questions 54

Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#

interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:

Options:

A.

If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3

B.

If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3

C.

If the packet source IP address is 1001.2, it cannot be forwarded

D.

If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged

Buy Now
Questions 55

Off-stem cross-domain VPN-Option B scenario, the following description is incorrect?

Options:

A.

During the packet forwarding process, it is necessary to exchange the VPN's private network LSP on the

B.

two ASBRs IP-EBGP neighbor relationships.

C.

The cross-domain VPN-Option B scheme is not limited by the number of interconnection links between ASBRs

D.

The outer layer tag is exchanged between two ASBRs to vpnV4 routes.

Buy Now
Questions 56

Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 57

The following description of IGMPv1 and IGMPv2 is correct?( Multiple select).

Options:

A.

IGMPv2 message types include member departure packets

B.

IGMPv2 does not support specific group queries

C.

IGMPv1 supports universal group queries

D.

The IGMPv1 message type does not contain members leaving the packet AD

Buy Now
Questions 58

What type of prefix does a router running BGP advertise to its IBGP neighbor (assuming the router is not configured as a route reflector)? (radio).

Options:

A.

Prefixes are learned through other IBGP neighbors, or prefixes are learned from EBGP neighbors, or prefixes are learned through routing introduction

B.

A prefix that exists in the routing table

C.

Prefixes are learned through other BGP neighbors, or prefixes are learned locally through network or routing introduction

D.

Prefixes are learned through EBGP neighbors, or prefixes are learned locally through network or routing introduction

E.

The prefix is learned through an EBGP neighbor, or the prefix is learned from an from RR

Buy Now
Questions 59

The correct description of the extended features of ISIS is ?

Options:

A.

When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.

B.

ISIS can choose whether to authenticate incoming SNP and LSP packets

C.

If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.

D.

After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.

Buy Now
Questions 60

Regarding the MPLS basic forwarding process, the following description is incorrect? Radio

Options:

A.

By default, the PHP-enabled Erass node assigns a label value of 3 to the inverted second-hop node.

B.

When an IP message enters the MPLS domain, the MPLS boundary device inserts a new label between the layer 2 header and the IP header.

C.

When the P message enters the MPLS domain, check whether the Tunel lD value corresponding to the destination IP address is Ox0O If the Tunel IlD value is Ox0 Then enter the MPLS forwarding process.

D.

The transport node device replaces the existing top-of-stack label (outermost label) with the label assigned by the next hop device.

Buy Now
Questions 61

After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?

Options:

A.

Send an alert

B.

The MAC address blocks

C.

Interface blocking

D.

Traffic filtering

Buy Now
Questions 62

When you deploy LLQ, you need to configure bandwidth parameters, what is the significance of bandwidth parameters?( Single choice questions).

Options:

A.

Provides a built-in policer to limit the maximum available bandwidth of a low-latency queue during congestion

B.

The parameter should be as small as possible. It means that the bandwidth is always preserved, and even if the LLQ is set, changing the parameters will reduce the available bandwidth of the interface

C.

It represents a reference CIR to calculate the burst size D of the built-in tactician token bucket Changing parameters is an option because LLQ always takes precedence over other queues

Buy Now
Questions 63

Which of the following are single-packet attacks?

Options:

A.

Special control message attacks

B.

Scan Probe Attack

C.

DDos Attack

D.

Malformed Message Attack

Buy Now
Questions 64

The following statement about IPSec VPN is correct

Options:

A.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

B.

The two routers establish IPSecVPN in main mode, and from the 5th message (included), the payload's data is often encrypted.

C.

Two routers establish an IPSec VPN in brutal mode, so that the tunnel is built with a minimum of 4 messages interacting between the two devices.

D.

The two routers can establish an OSPF neighbor relationship through the IPSec VPN (19) channel and exchange intranet devices by

Buy Now
Questions 65

As shown in the following figure, R1 and R2 establish a neighbor relationship for Level2, which is critical: placed as follows, then the following about The route entry for R2 is correct

H12-891_V1.0 Question 65

Options:

A.

The 0:/64 router appears in the IP routing table

B.

2022:/64 Routers appear in the IP routing table c.2019::/64 Routers appear in the P routing table

C.

2021:-/64 Router will appear in the P routing table

Buy Now
Questions 66

The following about BGP routing, what is the wrong description?

Options:

A.

Non-aggregate routes take precedence over aggregate routes.

B.

In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.

C.

See the following entry in the BGP routing table: • *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.

D.

For next_hop unreachable routes are invalid cat by and do not participate in the preference. Flogging case

Buy Now
Questions 67

Regarding the sliding window of TCP, what are the following descriptions that are enough to be wrong? ( Multiple choice question)

Options:

A.

The sender declares the initial window size

B.

The sender does not need to transmit messages of full window size

C.

The TCP sliding window allows multiple packets to be sent before an acknowledgment is received

D.

After the retransmission timer times out, the sender has not received an acknowledgment and will retransmit unacknowledged data

E.

The receiver needs to acknowledge the sender's packet

F.

Sliding window size can only be increased or remain unchanged

Buy Now
Questions 68

As shown below, RI, R2 establish EBGP neighbors, and once turned on, the BFD detection function, the following statement is correct?

H12-891_V1.0 Question 68

Options:

A.

RDetection time for BFD packets for 2 Detection time for BFD messages 800m5

B.

RI Detection time for BFD messages for 1280ms

C.

RI The detection time for bFD messages for 660ms

D.

R2 is 600ms

Buy Now
Questions 69

The following description of the Layer 6 functionality in the OSI reference model is correct?

Options:

A.

Synchronous communication

B.

Establishing, maintaining, and terminating communication sessions

C.

Provides a common data compression and encryption scheme

D.

Determines the availability of resources

Buy Now
Questions 70

What kind of scenario can use AS one path and one filter?

Options:

A.

Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.X.x.x as path-filter import

B.

The apply clause in Routepolicy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peerx. X.x.x as path-filter export

D.

If-natch clause answer in Route-policy.

Buy Now
Questions 71

Regarding the MPLS handling mode of TTL, the following description is correct?

Options:

A.

Pipe mode. When an IP message passes through an MPLS network, the IPTTL minus l at the entry point is mapped to the MPLS TTL field

B.

MPLS tags in the TTL, which mean the same as the TTL domain in the IP header. TTL prevents mpLS networks from creating routing loops

C.

In Unifor mode, when an IP message passes through an MPLS network, the inbound IPTTL is minus 1. The MPLSTTL field is a fixed value

D.

In MMLSVPI, if you need to hide the structure of the MPLS backbone network, you can use the Uniform mode on Ingress for private network messages

Buy Now
Questions 72

/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question).

Options:

A.

This router does not have an OSPF process number configured

B.

This router is configured with a different zone ID than its neighbor router's zone ID

C.

This router does not have authentication features configured, but neighbor routers configure authentication features

D.

The declared network address of this router does not match the interface mask

Buy Now
Questions 73

Which address prefix in the following options indicates that the address is globally unique and globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice questions).

Options:

A.

::1/128

B.

FE80:/10

C.

FE80::/10

D.

2000:;/3

Buy Now
Questions 74

Which of the following options is described correctly for the assertion mechanism?( Radio).

Options:

A.

Winner's election process does not make IP address size a condition of the election

B.

In the assertion mechanism, the winner is responsible for forwarding multicast data to the broadcast segment

C.

The assertion mechanism is used for the election of DR

D.

In the assertion mechanism, the loser will shut down the interface with the broadcast network necklace

Buy Now
Questions 75

As shown in the following figure, R1 and R2 establish a neighbor relationship with LeveL2, and the key configuration is as follows, so is the following route entry for R2 correct?

H12-891_V1.0 Question 75

Options:

A.

0::/64 The router will appear in the IP routing table

B.

2022::/64 Routers appear in the IP routing table

C.

2019::/64 Routers appear in the IP routing table

D.

2021::/64 Routers appear in the IP routing table

Buy Now
Questions 76

Without dividing the zone, is the following description of the link state routing protocol correct?

Options:

A.

Each router establishes a topology for the entire floodplain

B.

Each router learns route entries directly from the route update and adds them to the routing table

C.

Routers in the flood domain may receive the same link state information repeatedly

D.

Routers throughout the flood domain have the same database of wrong-state states

E.

The router will send all the mis-routing status information from one neighbor to all other neighbors to ensure the synchronization of the database

Buy Now
Questions 77

In an MPLS VPN network, different CE devices exchange routing information with the same PE device using different routing protocols, and different CE devices use routing protocols that are independent of each other

Options:

A.

True

B.

False

Buy Now
Questions 78

In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router.

Options:

A.

True

B.

False

Buy Now
Questions 79

One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is

2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).

Options:

A.

2013:0:130F:0:0:09CO:876Answer: 130B

B.

2013:130F::9CO:876Answer: 130B

C.

2013:0:130F:0:0:9CO:876Answer: 130B

D.

213::13F::9C:876Answer: 13B

E.

2013:0:130F::9CO:876Answer: 130B

Buy Now
Questions 80

The following description of the attributes of BGP is correct? Radio

Options:

A.

The AS number of the adjacent AS, ranked to the far right of the list of AS_Path in the BGP route entry.

B.

When a BGP Speaker publishes a route learned from an EBCP peer to an IBGP peer, it does not change the next hop attribute of that routing information.

C.

Local_Pref is valid only between EBGP peers and is not advertised to third-party AS

D.

A route can have only one community attribute value.

Buy Now
Questions 81

To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 82

Which of the following messages does the BGP protocol support?

Options:

A.

Update

B.

Open

C.

Hello

D.

Keepalive

Buy Now
Questions 83

A router receives a BGP route with the community attribute NO-Export , how will the router handle the BGP route?

Options:

A.

Drop the route directly.

B.

No more advertising to other BGP routers.

C.

Advertise only to IBGP neighbors.

D.

The route is advertised normally, but the route is not used to forward data.

Buy Now
Questions 84

Protocols with TCP ports 443, 179, 137, 110, and 23 are, in order: radio

Options:

A.

Finger,DHCP Server,NetBios Name Server,POP3,TelnetB

B.

LDAP,SNMP,TFTP,POP3,Telnet

C.

HTTPS,SNMP,POP3,DNS ,Telnet

D.

HiPS,BGP, NetBios Name Server ,POP3,TelnetE. BGP,POP3,SNMP,TFTP,Teinet

Buy Now
Questions 85

Router R1 runs the OSPF protocol, use the "display ip routing-table" command to view the routing table of the router R1, the following about the OSPF in the routing table Is the information described correctly?

Options:

A.

In the routing table, route table entries identified by the "OSPF" identifier can only be learned through LSAs of Type 3

B.

In the routing table, the routing table entries identified by the "OSPF" identifier can only pass Class 1 LSA

C.

In the routing table, the routing table entries identified by the "OSPF" identifier can be learned through the 1/2/3/5 LSA

D.

In the routing table, the routing table entry identified with the "O_ASE" identifier can only be learned by routing introduction

Buy Now
Questions 86

For a non-directly connected EBGP neighbor to establish properly, what configurations must be included as follows?

Options:

A.

peer ebgp-max-hop

B.

peer ignore

C.

peer as-number

D.

peer connect-interface

Buy Now
Questions 87

RTA is the source DR router, RTB is the RP router, and the multicast source sends multicast data to the RTA, but the PIM is not visible on the RTB Register the multicast source to which the message is registered, then the possible causes are ?

Options:

A.

Multicast network statically configures RP, while RTA router does not statically configure RP

B.

The RP elected by RTA is not an RTB

C.

RTB to RTA has no unicast routing, causing the RTB to fail RPF checks for the source

D.

The multicast network dynamically elects the RP instead RTA failed RPF check for BSR

Buy Now
Questions 88

If there is a switch running RSTP, which interface on that switch sends the BPDU with the Proposal logo??

Options:

A.

The specified port

B.

in the forwarding state. The specified port in a non-forwarding state

C.

Alternate port

D.

The root port in the Blocking state

Buy Now
Questions 89

What are the main reasons why RSTP converges faster than STP?

Options:

A.

RSTP increases the variety of port states

B.

RSTP has a smaller overhead

C.

RSTP does not converge based on timer

D.

RSTP has a smaller timer

Buy Now
Questions 90

The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select)

Options:

A.

Improved network equipment and link utilization

B.

It can effectively reduce network power consumption

C.

Business disruption time is greatly reduced

D.

Simplifies network management and reduces the complexity of network deployment planning

Buy Now
Questions 91

Which of the following parameters are not required when configuring BGP Peers?

Options:

A.

as-number

B.

password

C.

peer IP Address

D.

Description

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Nov 19, 2024
Questions: 610

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now H12-891_V1.0 testing engine

PDF (Q&A)

$31.5  $104.99
buy now H12-891_V1.0 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 24 Nov 2024